{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,22]],"date-time":"2025-10-22T09:52:41Z","timestamp":1761126761454,"version":"3.44.0"},"publisher-location":"New York, NY, USA","reference-count":21,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,2,18]],"date-time":"2020-02-18T00:00:00Z","timestamp":1581984000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,2,18]]},"DOI":"10.1145\/3384544.3384607","type":"proceedings-article","created":{"date-parts":[[2020,5,4]],"date-time":"2020-05-04T03:58:24Z","timestamp":1588564704000},"page":"26-30","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":3,"title":["Exploiting Deep Neural Networks for Intention Mining"],"prefix":"10.1145","author":[{"given":"Anam","family":"Habib","sequence":"first","affiliation":[{"name":"Institute of Computing and Information Technology, Gomal University, D.I.Khan(KP), Pakistan"}]},{"given":"Nosheen","family":"Jelani","sequence":"additional","affiliation":[{"name":"Institute of Computing and Information Technology, Gomal University, D.I.Khan(KP), Pakistan"}]},{"given":"Asad Masood","family":"Khattak","sequence":"additional","affiliation":[{"name":"College of Technological Innovation Zayed University, Abu Dhabi Campus, UAE"}]},{"given":"Saima","family":"Akbar","sequence":"additional","affiliation":[{"name":"Institute of Computing and Information Technology, Gomal University, D.I.Khan(KP), Pakistan"}]},{"given":"Muhammad Zubair","family":"Asghar","sequence":"additional","affiliation":[{"name":"Institute of Computing and Information Technology, Gomal University, D.I.Khan(KP), Pakistan"}]}],"member":"320","published-online":{"date-parts":[[2020,4,17]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-018-6445-z"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","unstructured":"Asghar M. Z. Ullah A. Ahmad S. and Khan A. 2019. Opinion spam detection framework using hybrid classification scheme. SOFT COMPUT 1--24. DOI= https:\/\/doi.org\/10.1007\/s00500-019-04107-y","DOI":"10.1007\/s00500-019-04107-y"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","unstructured":"Hemmatian F. and Sohrabi M. K. 2017. A survey on classification techniques for opinion mining and sentiment analysis. ARTIF INTELL REV 1--51. DOI= https:\/\/doi.org\/10.1007\/s10462-017-9599-6","DOI":"10.1007\/s10462-017-9599-6"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1111\/exsy.12233"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/1597735.1597780"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2017.2776930"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.5555\/2886521.2886653"},{"key":"e_1_3_2_1_8_1","volume-title":"2009 5th International Conference on Wireless Communications, Networking and Mobile Computing (The Beijing, The China","author":"Liu R.","year":"2009","unstructured":"Liu, R., Li, Y., and Qi, J. 2009. Making customer intention tactics with network value and churn rate. In 2009 5th International Conference on Wireless Communications, Networking and Mobile Computing (The Beijing, The China, September 2009), IEEE, China, 1--4. DOI= 10.1109\/WICOM.2009.5305473"},{"key":"e_1_3_2_1_9_1","volume-title":"Proceedings of COLING 2012: Demonstration Papers. (The Mumbai, The India","author":"Carlos C. S.","year":"2012","unstructured":"Carlos, C. S., and Yalamanchi, M. 2012. Intention analysis for sales, marketing and customer service. In Proceedings of COLING 2012: Demonstration Papers. (The Mumbai, The India, December 2012), India, 33--40."},{"key":"e_1_3_2_1_10_1","volume-title":"Proceedings of the 22nd International Conference on World Wide Web. (The Rio de Janeiro, The Brazil","author":"Hollerit B.","year":"2013","unstructured":"Hollerit, B., Kr\u00f6ll, M., and Strohmaier, M. 2013. Towards linking buyers and sellers: detecting commercial intent on twitter. In Proceedings of the 22nd International Conference on World Wide Web. (The Rio de Janeiro, The Brazil, May 13-17, 2013), ACM, New York, NY, 629--632. DOI= 10.1145\/2487788.2488009"},{"key":"e_1_3_2_1_11_1","volume-title":"Proceedings of the 2013 conference of the North American chapter of the association for computational linguistics: human language technologies. (The Atlanta","author":"Chen Z.","year":"2013","unstructured":"Chen, Z., Liu, B., Hsu, M., Castellanos, M., & Ghosh, R. (2013). Identifying intention posts in discussion forums. In Proceedings of the 2013 conference of the North American chapter of the association for computational linguistics: human language technologies. (The Atlanta, The Georgia, June, 2013), 1041--1050."},{"key":"e_1_3_2_1_12_1","volume-title":"Twenty-Ninth AAAI Conference on Artificial Intelligence. (The Hyatt Regency in Austin","author":"Wang J.","year":"2015","unstructured":"Wang, J., Cong, G., Zhao, X. W., and Li, X. 2015. Mining user intents in twitter: A semi-supervised approach to inferring intent categories for tweets. In Twenty-Ninth AAAI Conference on Artificial Intelligence. (The Hyatt Regency in Austin, The Texas, January 25-30, 2015). USA."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-49390-8_2"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/EISIC.2016.032"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-58562-8_21"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-63315-2_36"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.24963\/ijcai.2018\/560"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","unstructured":"Wang Y. Huang J. He T. and Tu X. 2019. Dialogue intent classification with character-CNN-BGRU networks. MULTIMED TOOLS APPL. 1--20. DOI= https:\/\/doi.org\/10.1007\/s11042-019-7678-1","DOI":"10.1007\/s11042-019-7678-1"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1186\/s13673-019-0185-6"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1007\/s13278-019-0595-5"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-57454-7_1"}],"event":{"name":"ICSCA 2020: 2020 9th International Conference on Software and Computer Applications","acronym":"ICSCA 2020","location":"Langkawi Malaysia"},"container-title":["Proceedings of the 2020 9th International Conference on Software and Computer Applications"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3384544.3384607","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3384544.3384607","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,22]],"date-time":"2025-08-22T05:18:19Z","timestamp":1755839899000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3384544.3384607"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,2,18]]},"references-count":21,"alternative-id":["10.1145\/3384544.3384607","10.1145\/3384544"],"URL":"https:\/\/doi.org\/10.1145\/3384544.3384607","relation":{},"subject":[],"published":{"date-parts":[[2020,2,18]]},"assertion":[{"value":"2020-04-17","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}